-
Notifications
You must be signed in to change notification settings - Fork 568
Description
Let us know the feedback or general question
I am looking for some guidance in the documentation to handle inactive identities created by ALZ-Bicep for remediating policies as they pop up in the Defender for Cloud recommendations as inactive identities.
When I deploy all the custom policy assignments from ALZ-Bicep, a lot of system managed identities are created to remediate these policies. However, Defender for Cloud reports a lot of these identities as medium severity: Permissions of inactive identities in your Azure subscription should be revoked.
Some are even marked as critical, due to it's assigned permissions.
This alert gets triggered according to this description in Defender for Cloud:
Microsoft Defender for Cloud discovered an identity that has not performed any action on any resource within your Azure subscription in the past 45 days. It is recommended to revoke permissions of inactive identities, in order to reduce the attack surface of your cloud environment.
Some of these identities are not used at the moment, as I don't have these type of resources deployed in my Landing Zone, but this could always change in the future.
Others I haven't needed to remediate anything the past 45 days, but might be needed again in the future.
For example: the system managed identity Deploy-VMSS-Monitoring is deployed by a policy definition and creates a system managed identity, but is never used.
I suppose removing these permissions would remediate the issue or I could make exemptions for all these identities, but I'm looking for some best practice guidance on this matter.
Code of Conduct
- I agree to follow this project's Code of Conduct
Metadata
Metadata
Assignees
Labels
Type
Projects
Status